Vulnerability Scanner is a powerful Bash-based automation tool crafted for penetration testers and cybersecurity professionals. It combines intelligence gathering, brute-force testing, and exploit analysis into one streamlined command-line utility. Whether you’re conducting a basic recon or an in-depth assessment, this tool helps identify weak spots in a network environment effectively.
- 🔍 Automated Reconnaissance & Scanning
- 🔐 Brute-force login attacks with Hydra
- 🗂️ Directory and file enumeration using Gobuster
- 🧠 WHOIS and ExploitDB Intelligence Gathering
- 💾 Structured output for each IP with auto-zipping for archives
- 📁 Scan management: Start new scans or inspect previous results
Make sure the following tools are installed on your system:
nmaphydragobusterwhoissearchsploit(comes withexploitdb)
/usr/share/seclists/Usernames/top-usernames-shortlist.txt/usr/share/wordlists/metasploit/unix_passwords.txt/usr/share/wordlists/rockyou.txt
sudo apt update
sudo apt install nmap hydra gobuster whois exploitdb├── vulnerability_scanner.sh # Main script
├── DB/
│ └── [SCAN_RESULTS]/
│ ├── [IP_REPORTS]/
│ ├── full_scan_results.txt
│ ├── exploit_analysis.txt
│ ├── gobuster_report.txt
│ ├── whois_report.txt
├── .scan # Temporary scan state file
├── .chk # Temporary check file
Make the script executable and run it:
chmod +x vulnerability_scanner.sh
./vulnerability_scanner.sh
[N] New Scan:
Choose between Basic or Full scan
Provide a valid IP range (e.g., 192.168.1.0/24)
Enter a directory name to store results
[I] Inspect Previous Results:
Enter the target IP address
Automatically zips and shows past results for sharing or review
-
Within each scan folder, you’ll find:
-
full_scan_results.txt – nmap results
-
exploit_analysis.txt – Matches found via searchsploit
-
gobuster_report.txt – Directory enumeration output
-
whois_report.txt – WHOIS lookup information
-
[IP_REPORTS] – Directory with all target-specific logs and data
❗ This tool is intended only for authorized testing and educational use. Do not scan or test any network you do not own or have written permission to assess. Unauthorized use of this tool is illegal and unethical.
Srishti Rathi 🛡️ Security Researcher | 🕵️ Penetration Tester